Pruning Edge Research with Latency Shears

Nitinder Mohan*, Lorenzo Corneo, Aleksandr Zavodovski , Suzan Bayhan, Walter Wong, Jussi Kangasharju

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

57 Citations (Scopus)
131 Downloads (Pure)

Abstract

Edge computing has gained attention from both academia and industry by pursuing two significant challenges: 1) moving latency critical services closer to the users, 2) saving network bandwidth by aggregating large flows before sending them to the cloud. While the rationale appeared sound at its inception almost a decade ago, several current trends are impacting it. Clouds have spread geographically reducing end-user latency, mobile phones? computing capabilities are improving, and network bandwidth at the core keeps increasing. In this paper, we scrutinize edge computing, examining its outlook and future in the context of these trends. We perform extensive client-to-cloud measurements using RIPE Atlas, and show that latency reduction as motivation for edge is not as persuasive as once believed; for most applications the cloud is already 'close enough' for majority of the world's population. This implies that edge computing may only be applicable for certain application niches, as opposed to a general-purpose solution.
Original languageEnglish
Title of host publicationHotNets'20
Subtitle of host publicationThe 19th ACM Workshop on Hot Topics in Networks
EditorsBen Zhao, Heather Zheng
PublisherACM Publishing
Pages182-189
ISBN (Print)978-1-4503-8145-1
DOIs
Publication statusPublished - 3 Nov 2020
Event19th ACM Workshop on Hot Topics in Networks, HotNets 2020 - Online, Chicago, United States
Duration: 4 Nov 20206 Nov 2020
Conference number: 19

Conference

Conference19th ACM Workshop on Hot Topics in Networks, HotNets 2020
Abbreviated titleHotNets 2020
Country/TerritoryUnited States
CityChicago
Period4/11/206/11/20

Fingerprint

Dive into the research topics of 'Pruning Edge Research with Latency Shears'. Together they form a unique fingerprint.

Cite this